Each Enricher essentially copies every other enricher's "Enrich" method. We should consider just having one version which each Enrich uses. Related: each one considers the vulnerability's description, which may not be an accurate way of identifying CVE ID. We may want to consider removing that
-
Unassigned
-
Ross Tannenbaum
- Votes:
-
0 Vote for this issue
- Watchers:
-
2 Start watching this issue
- Created:
- Updated: